Python Penetration Testing Cookbook Packt Publishing, 2017. ,
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2005. ,
Wireless sensor network denial of sleep attack, Proc. 2005 IEEE workshop on information assurance and security, 2005. ,
Comparison of zigbee replay attacks using a universal software radio peripheral and usb radio, 2014. ,
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs, pp.1-16, 2013. ,
A survey in energy drain attacks and their countermeasures in wireless sensor networks, Int. J. Eng. Res. Technol, vol.3, issue.2, 2014. ,
Fighting insomnia: A secure wake-up scheme for wireless sensor networks, 3rd International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE SECURWARE'09, pp.191-196, 2009. ,
Impact of signaling storms on energy consumption and latency of lte user equipment, 2015 IEEE 7th Int. Symp. on Cyberspace Safety and Security, pp.1248-1255, 2015. ,
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, ACM Trans. Sen. Netw, vol.5, issue.1, 2009. ,
A synchronization attack and defense in energy-efficient listen-sleep slotted mac protocols, Int. Conf. on Emerging Security Information, Systems and Technologies, p.2, 2008. ,
The sleep deprivation attack in sensor networks: Analysis and methods of defense, Int. Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006. ,
The resurrecting duckling: Security issues for ad-hoc wireless networks, 7th Int. Workshop Security Protocols, 1999. ,
Vampire attacks: Draining life from wireless ad hoc sensor networks, IEEE Trans. Mobile Computing, vol.12, issue.2, pp.318-332, 2013. ,
Deep Learning with Dense Random Neural Networks, Proc. Int. Conf. on Man-Machine Interactions, pp.3-18, 2017. ,
Single-cell based random neural network for deep learning, Neural Networks (IJCNN), 2017 Int. Joint Conference on, pp.86-93, 2017. ,
, Deep learning with random neural networks. Neural Networks (IJCNN), 2016 Int. Joint Conference on, pp.1633-1638, 2016.
Learning in the recurrent random neural network, Neural Computation, vol.5, issue.1, pp.154-164, 1993. ,
Random neural networks with negative and positive signals and product form solution, Neural Computation, vol.1, issue.4, pp.502-510, 1989. ,
GHOST -Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control, Proceedings of the 2018 ISCIS Security Workshop, 2018. ,